CVE-2018-7286

An issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. res_pjsip allows remote authenticated users to crash Asterisk (segmentation fault) by sending a number of SIP INVITE messages on a TCP or TLS connection and then suddenly closing the connection.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
cpe:2.3:a:digium:asterisk:13.19.1:*:*:*:*:*:*:*
cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:11

Type Values Removed Values Added
References () http://downloads.asterisk.org/pub/security/AST-2018-005.html - Vendor Advisory () http://downloads.asterisk.org/pub/security/AST-2018-005.html - Vendor Advisory
References () http://www.securityfocus.com/bid/103129 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103129 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040417 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040417 - Third Party Advisory, VDB Entry
References () https://issues.asterisk.org/jira/browse/ASTERISK-27618 - Vendor Advisory () https://issues.asterisk.org/jira/browse/ASTERISK-27618 - Vendor Advisory
References () https://www.debian.org/security/2018/dsa-4320 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4320 - Third Party Advisory
References () https://www.exploit-db.com/exploits/44181/ - Exploit, VDB Entry, Third Party Advisory () https://www.exploit-db.com/exploits/44181/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-02-22 00:29

Updated : 2024-11-21 04:11


NVD link : CVE-2018-7286

Mitre link : CVE-2018-7286

CVE.ORG link : CVE-2018-7286


JSON object : View

Products Affected

debian

  • debian_linux

digium

  • asterisk
  • certified_asterisk